The flaw made it possible for hackers to infiltrate Apple mobile devices by duping users into opening PDF document files booby-trapped with malicious computer code. Although no attacks have been observed, it was feared that hackers would exploit the weakness.